- Insight Global (Oakton, VA)
- …Government contractors. -Responsible for Forensic analysis, Cyber hunting, Proactive threat detection & analysis, Malware reconstruction and Packet analysis. -Become ... as requested. -Understand how attackers leverage TOR and Dark Web sources to sell exploits and stolen data. -Identify...and stolen data. -Identify and respond to potential insider threat activity. Validate VDPs from public bug bounty sources.… more
- Koniag Government Services (Washington, DC)
- …(SIEM), Security Orchestration Automation and Response (SOAR), Data Loss Prevention (DLP), Web Application Firewalls (WAF), Threat Intel, Endpoint Security ... Duties may include, but are not limited to:** + Review and technical inspection of cloud systems, identifying and...Experience deploying resources into and running workloads in Amazon Web Services and/or Microsoft Azure + Ability to clearly… more
- GliaCell Technologies (Columbia, MD)
- Are you a Senior Web Application Developer who is ready for a new challenge that will launch your career to the next level? + Tired of being treated like a ... by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat ...talented people Job Description: GliaCell is seeking a Senior Web Application Developer on one of our… more
- Ryder System (Washington, DC)
- …or a related field, required. + Five (5) years or more strong understanding of web application security and common attack vectors. (eg SQL injection, XSS, CSRF), ... in application security and knowledge of programming languages and web technologies. A Bachelor's degree in Computer Science and certifications such as… more
- Amazon (Arlington, VA)
- …with in-depth understanding of application security assessment methodologies such threat modeling, secure design reviews, secure code review , and penetration ... will lead the strategic direction and evolution of the Application Security review team/s, including setting goals...knowledge of information security technologies such as security design review , threat modeling, secure code review… more
- Amazon (Herndon, VA)
- …and Users as they learn how to maximize tools, services, and offerings in Amazon Web Services (AWS). Join us as we build and operate learning experiences that allow ... In a given day, you might be inspecting an application 's and Lab code for security issues, building a...Own security design and architecture choices (includes architecture reviews, threat modeling, code reviews and security testing). * Machine… more
- EPAM Systems (Mclean, VA)
- …with security tools and technologies such as static and dynamic analysis tools, web application firewalls, etc + Proficiency in programming languages commonly ... career journey? Apply now! We are seeking an accomplished Application Security Architect to join our team and play...points in current processes and make recommendations + Perform threat modeling, security architecture review , and risk… more
- Rubrik (Washington, DC)
- … application security, with experience across SDLC activities such as threat modeling, secure code review , vulnerability management, and penetration testing ... as FedRAMP, SOC2, ISO 27001. + Broad knowledge of web , application , and cloud attack vectors and...norms that have prevented equal representation. This means we review our current efforts with the intent to offer… more
- Proofpoint (Reston, VA)
- …& usable + Design, code, review , test, and deploy software features in our application stack + Create API routes and web pages that communicate our threat ... risks across email, the cloud, social media, and the web . We are singularly devoted to helping our customers...Role As a Full Stack Engineer (UI) on our threat intelligence team, you will be building massive-scale systems… more
- Leidos (Ashburn, VA)
- … Application Security, Protocol Analysis, Firewall Management, Incident Response, Web -filtering, Advanced Threat Protection + Experience developing advanced ... **Description** Leidos is seeking an experienced threat detection engineer to join our team on...+ Develop, manage, and maintain Splunk data models + Review logs to determine if relevant data is present… more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- Georgetown Univerisity (Washington, DC)
- …systems and their applications, but with a security focus and understanding of the threat landscape. As well, they have the expertise to address the issues of today, ... with leading AI, communications, and smart vendors + Experienced with Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure. + General knowledge… more
- General Dynamics Information Technology (Washington, DC)
- …our team to provide administrative and technical support to law enforcement and threat intelligence operations that support the highest levels of government. When we ... performs assessments to determine pattern of life attributes and the identity of threat actors. + Has knowledge of forensic analysis of digital information and uses… more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- GliaCell Technologies (Columbia, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- GliaCell Technologies (Columbia, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- GliaCell Technologies (Columbia, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- PenFed Credit Union (Mclean, VA)
- …the integrity and availability of all hardware, resources, systems, and key processes. Review system and application logs, and verify completion of scheduled ... systems in a phased approach of requirements analysis, system design review , installation, integration, and testing. + Lead the development of product/project… more
- Georgetown Univerisity (Washington, DC)
- …systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given that cyber endpoint health ... + Proficiency with SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, and automation and response… more