- Booz Allen Hamilton (Boston, MA)
- …with application security and testing, including secure coding practices and vulnerability assessment methodologies, administering and assessing network devices ... both manual and automated processes, including automated compliance and vulnerability scanners and system configuration reviews.Experience with security GRC… more
- Goldman Sachs Bank AG (Dallas, TX)
- …encryption (at rest/ in transit), IDS/IPS, DLP, malware etc.Experience in application vulnerability assessment and penetration testing of web, thick-client, or ... for the developers and architects in the respective Business Unit.Review security assessment reports from pentest and code review engagements.Conduct Read out Calls… more
- The Goldman Sachs Group (Dallas, TX)
- …encryption (at rest/in transit), IDS/IPS, DLP, malware, etc.Experience in application vulnerability assessment and penetration testing of web, thick-client, or ... for the developers and architects in the respective Business Unit.Review security assessment reports from pentest and code review engagements.Conduct Read out Calls… more
- The Cypress Group (Boston, MA)
- …and implementing all security initiatives including risk management, risk assessment , vulnerability assessments, threat monitoring, compliance, audit and ... properly following system failures or outages. Facilitate and perform vulnerability testing with application development and infrastructure/network teams. Contribute… more
- OFFICE OF LABOR RELATIONS (New York, NY)
- …the Plan's external IT auditors during the annual Cyber Security Assessment . Support the development, implementation and monitoring of a comprehensive enterprise ... Cyber Security Operations / Activities: Track cyber security incidents and vulnerability reports, direct teams for remediation of issues. Ensure identity and… more
- Optiv Security Inc. (Denver, CO)
- …industry groups, delivering talks, writing technical and industry-specific blogs, vulnerability research, industry PR interviews, and/or contributing to security ... risks to clients based on industry and business focus.Create comprehensive assessment reports that clearly identify root cause and remediation strategies.Interface… more
- ITmPowered (Boston, MA)
- …fieldwork/controls testing, and reporting). Scope and Plan IT Controls Assessment engagements. Lead Kickoff meetings, set expectations and schedule. Clearly ... results supported by clear evidentiary artifacts. Reporting - Write full IT Controls Assessment (IT Audit) Reports - Assessment Scope, Audit details, controls… more
- Booz Allen Hamilton (Washington, DC)
- …using both manual and automated processes, including automated compliance and vulnerability scanners, and system configuration reviews such as CIS Benchmarks, STIGS, ... materially enhance organizational security risk postureAbility to write whitepapers, assessment reports, presentations, and briefs, communicate effectively across all… more
- TRC Companies, Inc. (Boston, MA)
- …CBCP or in other related areas.Knowledge of BPATS, ISC and FEMA assessment methodologies.Knowledge of various security requirements for various sectors of critical ... conditions over time. Our services include:Emergency Management Plans.Threat and Vulnerability Assessments.FEMA Grant Support.Hazard Mitigation Plans.Risk (Physical and Operational)… more
- Hispanic Technology Executive Council (Los Angeles, CA)
- …for cybersecurity capabilities, such as data protection, insider risk, vulnerability management, security operations, security analytics, application security, cloud ... digital identity.Analyze clients' security posture to create current state assessment , gap analysis, and strategic implementation roadmaps.Partner with additional… more
- Capco (New York, NY)
- …Threat/ Vulnerability , Digital Trust, Awareness and Training Cyber risk assessment experience The ability to communicate effectively to diverse audiences and ... properly translate security and risk management terminology into business terms for stakeholders Awareness of security engineering concepts and practices across all phases of the system development lifecycle Ability to lead projects independently Experience… more
- Calm (CA)
- …implement privacy-by-design principles.Identify applicable laws and regulations, assess compliance vulnerability and risk, provide actionable advice, and develop and ... implement action plans to mitigate potential risks.Assist in the review and assessment of new products, features, and uses of data to assess compliance with laws,… more
- Accenture (Los Angeles, CA)
- …for cybersecurity capabilities, such as data protection, insider risk, vulnerability management, security operations, security analytics, application security, cloud ... digital identity.Analyze client's security posture to create current state assessment , gap analysis, and strategic implementation roadmaps.Partner with additional… more
- CyBourn (Washington, DC)
- …monitoring services and threat detection capabilities with best-in-class business risk assessment to provide the optimal incident response approach for every client. ... of diverse cybersecurity technologies, including SIEM, EDR, IDS/IPS, Firewall, Vulnerability Management, Identity and Access Management, and the Zero-Trust approach,… more
- Lionheart Ventures (Los Angeles, CA)
- …privacy-by-design principles. Identify applicable laws and regulations, assess compliance vulnerability and risk, provide actionable advice, and develop and ... implement action plans to mitigate potential risks. Assist in the review and assessment of new products, features, and uses of data to assess compliance with laws,… more
- Calm (San Francisco, CA)
- …implement privacy-by-design principles.Identify applicable laws and regulations, assess compliance vulnerability and risk, provide actionable advice, and develop and ... implement action plans to mitigate potential risks.Assist in the review and assessment of new products, features, and uses of data to assess compliance with laws,… more
- V2X (Bangor, WA)
- …a Counterintelligence (CI) Polygraph. Responsibilities + What You'll Do + The CND Vulnerability Assessment Specialist is an expert in vulnerability ... scanners/tools. + Responabilities + Developing and executing the organization's continuous vulnerability assessment strategy. + Measuring the effectiveness of… more
- Oneida Technical Solutions (Leesville, LA)
- …contract award to Oneida Technical Solutions. Job Title: Cybersecurity Analyst/Lead Vulnerability Assessment Analyst Location: Ft. JohnsonClearance Level: Secret ... T5 Investigation.Compliance: DOD 8140 Compliant Position Overview: The Cybersecurity Analyst/Lead Vulnerability Assessment Analyst will oversee and conduct … more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …+ years of related experience **US Citizenship Required:** Yes **Job Description:** Vulnerability Assessment Analyst Transform technology into opportunity as an ... Vulnerability Assessment Analyst with GDIT. A career in enterprise IT...operate. At GDIT, people are our differentiator. As an Vulnerability Assessment Analyst you will help ensure… more
- Oneida Technical Solutions (Leesville, LA)
- …award to Oneida Technical Solutions. Job Description: Cybersecurity Analyst II - Vulnerability Assessment Analyst Position Title: Cybersecurity Analyst II - ... Vulnerability Assessment AnalystClearance Level: Secret - must be eligible for...for T5 Position Overview: The Cybersecurity Analyst II - Vulnerability Assessment Analyst is responsible for conducting… more