- New Season (Maitland, FL)
- …calendar for patient scheduling purposes. Reports patient abuse, neglect and exploitation as required. Reports patient grievances as required. Coordinates Urine Drug ... Screens with clinic liaisons and completes any required documentation. Ensures the reading and understanding of the General, program and state specific Policy and Procedures Manuals. Ensures compliance with 42 CFR Part 2 (Federal Confidentiality Regulations)… more
- New Season (Lehigh Acres, FL)
- …through individual or group counseling. Reports patient abuse, neglect and exploitation as required. Reports patient grievances as required. Educates patient in ... all aspects of treatment, corresponding health issues and steps to recovery. Obtains Urine Drug Screens and initial patient photo identification. Assists in monitoring all patient activities on center premises. Actively participates in community relations… more
- Shannon Health (San Angelo, TX)
- …have experienced or are suspected of experiencing sexual assault, abuse, or exploitation . The SANE demonstrates competency in conducting medical forensic exams and ... collaborates with appropriate professionals within and outside the health system to implement individualized care plans. Education Education Type Program of Study Required/Preferred High School Diploma N/A Required Accredited Program Nursing Required… more
- MCKESSON (Irving, TX)
- …external pentest vendors and service providers. Vulnerability Assessment & Exploitation Conduct in-depth vulnerability assessments using both automated tools and ... manual techniques. Validate and exploit vulnerabilities to demonstrate potential impact and risk. Collaborate with Application teams and peer Cybersecurity groups to ensure timely remediation and risk mitigation. Security Tooling & Automation Develop and… more
- New Season (Hagerstown, MD)
- …counseling and interaction through groups. Reports patient abuse, neglect, and exploitation as required. Assists in monitoring all patient activities on center ... premises. Actively participates in community relations activities as directed and authorized. Ensures the reading and understanding of the Policy and Procedures Manual. Ensures compliance with 42 CFR Part 2 (Federal Confidentiality Regulations) and 45 CFR,… more
- USAA (San Antonio, TX)
- …to include: PCI, REG CC, REG E, UCC, FCRA, BSA/AML, Elder Financial Exploitation guidance, OCC Fraud Risk Management 2019-37. What sets you apart: US military ... experience through military service or a military spouse/domestic partner Demonstrated experience in Business Process Management (planning, development of relevant business objectives/metrics/tactics, execution, post implementation support, Issue Management,… more
- OhioHealth (Pickerington, OH)
- …plan of care. Participates in identification of cases of abuse, neglect or exploitation and refers such cases to the legally mandated authorities when applicable. ... Provides crisis intervention, information and referral and linkage to community resources as needed. 30% Intervention Management Develops a plan of intervention based upon assessment to resolve identified problems and/or to support and enhance biopsychosocial… more
- OhioHealth (Columbus, OH)
- …plan of care. Participates in identification of cases of abuse, neglect or exploitation and refers such cases to the legally mandated authorities when applicable. ... Provides crisis intervention, information and referral and linkage to community resources as needed. 30% Advanced Intervention Management Develops a plan of intervention based upon assessment to resolve identified problems and/or to support and enhance… more
- Belay Technologies (Hanover, MD)
- …runner up in 2020 and a finalist in 2021! Belay is hiring an Exploitation Analysts (EA) to work on a critical mission supporting the Intelligence Community (IC). ... have many of the same skills of Digital Network Exploitation Analyst (DNEA), but their primary mission is more...(DNEA), but their primary mission is more focused on exploitation . In addition to maintaining DNEA-level understanding of adversary… more
- Amentum (Norfolk, VA)
- Amentum is looking for an Exploitation Analyst that will develop or oversee development of detailed plans that are executed by the OPTEVFOR Red Team. The ... Exploitation Analyst will function as a subject matter expert...in DoD defensive or offensive cyberspace operations planning or exploitation analysis + Proficiency in decomposing complex computer systems/networking… more
- Rigid Tactical (Norfolk, VA)
- Rigid Tactical is actively seeking a Subject Matter Expert (SME) Exploitation Analyst to join our mission-focused team as Key Personnel supporting OPTEVFOR Cyber ... complex Navy IT systems, determine system access points, and develop detailed exploitation strategies and test objectives for the supporting Red Team. Your work… more
- Amentum (Fort Meade, MD)
- Amentum is seeking ** Exploitation Analysts 1-4 (EA)** to use information collected from a variety sources (eg, intrusion detection systems, firewalls, network ... against events that might occur. Essential Duties: + Primary mission is exploitation . Create exploitation plans and make operational adjustments using… more
- CACI International (Aberdeen Proving Ground, MD)
- Electronics Exploitation (EE) Deployer Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: ... Continental US * * * **The Opportunity:** CACI is seeking an Electronics Exploitation (EE) Deployer. **What You'll Get to Do:** + Embark on thrilling overseas… more
- Cambridge International Systems Inc (Norfolk, VA)
- Exploitation Analyst - Top Secret Clearance | Norfolk, VA Cambridge International Systems, Inc. Join a dynamic global team united by shared values: commitment, ... and critical challenges in defense and security. We are currently seeking an Exploitation Analyst to support operations in Norfolk, VA. This is a full-time position… more
- Vexterra Group (Bethesda, MD)
- Vexterra Group is currently searching for a TS/SCI cleared Hardware Exploitation Engineer to provide the following engineering support: + Conduc t technical hardware ... exploitation and examination of various digital media devices. +...failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify hardware to either enable forensic… more
- Amentum (Fort Meade, MD)
- Amentum is seeking multiple **Digital Network Exploitation Analyst 1-4 (DNEA)** to perform technical analysis of metadata and content to ensure target continuity, to ... the traffic movements in a network. + Shift-work may be required. **Digital Network Exploitation Analyst 1** Minimum Requirements: + Must be a US citizen. + Must… more
- CACI International (Fort Meade, MD)
- Exploitation Analyst (EA) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular ... their cyber missions and protect their enterprises against cyber threats. CACI is seeking Exploitation Analysts (EAs) of all skill levels for a variety of roles to… more
- CACI International (Fort Meade, MD)
- Digital Network Exploitation Analyst (DNEA) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph ... and protect their enterprises against cyber threats. CACI is seeking Digital Network Exploitation Analysts (DNEAs) of all skill levels for a variety of roles to… more
- Insight Global (Reston, VA)
- Job Description Insight Global is actively hiring multiple Cyber Network Defense and Exploitation Analyst (Blue Team and Red Team) to join our team supporting a ... Operations (CNO) including Defensive Cyber Operations, Offensive Cyber Operations, and Exploitation Operations. Candidates should have s strong, hands on background… more
- MIT Lincoln Laboratory (Lexington, MA)
- …hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and prototype cutting-edge capabilities for our operational ... the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a...When you join our team as a Cyber System Exploitation Researcher, you'll be leading the development of cyber… more
Related Job Searches:
Cyber Systems Exploitation Researcher,
Cyber Test Exploitation Engineer,
Data Scientist Exploitation Specialist,
Digital Network Exploitation Analyst,
Exploitation Analyst,
Exploitation Analyst EA,
Financial Intelligence Exploitation Officer,
Hardware Exploitation Engineer TS,
Network Exploitation Analyst,
Senior Exploitation Analyst