Search Results: 39,166 vacancies
...Position Title: Analyst Vulnerability Management - Network
Position Summary
At JetBlue, cyber... ...the concepts of Risk Management and Threat-Informed Defense, the study of current... ...mitigating controls.
Collaborate with engineering and Quality Assurance (QA) teams to...
Suggested
Work experience placement
Immediate start
Flexible hours
Night shift
...Vulnerability Manager
Location: Adelphi, Maryland
Seeking a Vulnerability Manager that is experienced in Vulnerability Management and... ...disabled veteran-owned small business (SDVOSB) with offerings in Engineering, Gaming, Human Capital, Enterprise Technology and Cyber...
Suggested
Holiday work
Full time
Contract work
Local area
Remote job
Flexible hours
Vulnerability Management Engineer Location Chevy Chase, MD : GEICO is seeking an enthusiastic and experienced Principal Engineer to provide support... ...driven insights
Stay current on industry trends, emerging threats and best practices in vulnerability management and adapt...
Suggested
Full time
Work experience placement
Local area
...assets from evolving cyber threats. We strive to maintain our position... ...Cyber Threat Intelligence Engineer within our dynamic and... ...development expertise to architect, manage, and fine-tune threat... ...discovery of emerging threats, vulnerabilities, and patterns.
MISP:...
Suggested
Hourly pay
Work experience placement
Local area
...Gray Tier Technologies is seeking a Threat Detection Engineer for a new customer on a highly-visible... ...continuous monitoring
Develop, manage, and maintain Splunk data models
Review... ...areas related to cybersecurity: Vulnerability Assessment, Intrusion Prevention and...
Suggested
...contingent upon contract award.
Responsibilities
Insider Threat Engineering Specialists implement NGA's Scaled Agile Framework for the... ..., and architectures that establish the framework for the management of all Insider Threat Program IT.
They analyze, plan, design...
Suggested
Contract work
...Job Title: Apps and Server Vulnerability Engineer (Onsite)
Location: Washington, DC
Duration: 12 Months+
Job Description:
We are... ...have a strong understanding of security vulnerabilities and threats, as well as experience in remediation techniques.
Key...
Suggested
3 days per week
...to support security standards and compliance requirements. Must have the technical depth to be hands on to remediate security vulnerabilities and able to do this in DevSecOps environment. Work closely with the infrastructure architecture, development architecture, technical...
Suggested
Local area
...businesses from cyberattacks, preparing them for upcoming threats, and earning a plethora of awards along the way.
We... ...unparalleled.
We are seeking a dedicated and skilled Vulnerability Management Engineer to join our Managed Security Services team. The ideal candidate...
Suggested
Full time
Temporary work
Casual work
Local area
Remote job
Gangs
...Job Description
Job Description Insider Threat Security Engineer
PKH Enterprises is seeking qualified individuals to support both government... ...to potential insider threats.
· Must troubleshoot and manage network infrastructure with the first four layer of the...
Suggested
Remote job
...Cyber Threat Analyst
Location: Arlington, VA
Must have Top... ...in cyber incident management or cybersecurity operations... ...recognizing and categorizing types of vulnerabilities and associated attacks
- Knowledge... ...Automation & Cognitive Engineering company that integrates best...
Suggested
Holiday work
Contract work
Immediate start
Shift work
...As a Senior Director of Security Engineering at JPMorgan Chase within the Cybersecurity... ...Things (IoT) Security and Endpoint Vulnerability Management team, you will lead multiple technical... ...enforce security protocols, and monitor threats, ensuring technology control...
Suggested
Permanent employment
...penetration; and issue public warnings regarding intelligence threats to the U.S.
This job is open to
Federal employees - Competitive... ..., NCSC/ETD seeks to advance the U.S. Government's risk management environment in protecting the nation; advocate for and serve as...
Suggested
Permanent employment
Full time
Temporary work
Part time
For contractors
...Amazon is seeking an innovative Senior Security Intel Engineer to join the Vulnerability and Exploitation Threat Intelligence (VEX TI) team as a part of Amazon... ...QUALIFICATIONS
- BS degree in Computer Science, Management Information Systems, Computer Engineering, or 5+ years...
Suggested
Full time
Flexible hours
...security clearance.
Global Engineering and Technology (GET) is seeking qualified applicants for Vulnerability Analyst in support of the United... ...assessment data and collaborates with the threat intelligence section to prioritize and manage patch updates based on the risk...
Suggested
Remote job
Temporary work
Local area
...Two Six Technologies is seeking an experienced Principal Vulnerability Researcher with expertise in RF or communications domains to... .... The team is growing and looking for someone with a reverse engineering and vulnerability research background who understands how to...
Local area
...Solutions is currently seeking a Senior Threat Hunter to provide advanced threat hunting... ...-based Security Information and Event Management (SIEM) alerts to develop hunt hypotheses... ...Bachelors degree in computer science, computer engineering, software engineering, cybersecurity, or...
Full time
Immediate start
Remote job
Monday to Thursday
...new ideas.
We are seeking engineers who wish to grow their careers... ...We are seeking a Cyber Threat Analyst to conduct research and anaysis of technical vulnerabilities including evaluating prevelence... ...experience.
CTI process or management exposure, intelligence...
Hourly pay
Temporary work
Summer work
Second job
Immediate start
Flexible hours
...Description:
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must... ..., we will test you on both software development and reverse engineering skills as part of our hiring process. At this time, the...
For contractors
Local area
Remote job
Relocation package
...Systems Inc., an employee-owned Management Consulting and Digital... ...Transformation Company is seeking a Vulnerability Assessment Analyst (Mid-... ...(e.g., Snort).
Mimicking threat behaviors.
Use of... ...Kali Linux).
Use of social engineering techniques. (e.g., phishing,...
Local area